Training Syllabus

๐Ÿ•˜ Duration: 3ย full days (08:00 AM โ€“ 05:00 PM GMT+7)

๐Ÿ‘ฅ Minimum Participants: 5 people

๐Ÿ’ผ Fee: Based on agreement and venue


๐Ÿ“‹ Training Overview


In the era of digital transformation, cyber threats represent strategic risks that can directly affect organizational operations, reputation, and sustainability. Cyber security is no longer solely the responsibility of information technology units; rather, it is a shared responsibility that extends to officers as decision-makers, process supervisors, and guardians of compliance.

The Cyber Security for IT Leaders and Professionalย program is designed to equip participants with a fundamental understanding of the cyber threat landscape, core principles of information security, and the roles and responsibilities of officers in preventing, detecting, and responding to cyber security incidents. Through this syllabus, participants will gain insight into how policies, governance structures, and secure workplace behaviors contribute to the protection of organizational information assets.

This training emphasizes a practical and contextual approach, enabling officers to apply cyber security principles in daily decision-making, ensure regulatory compliance, and support the development of a strong information security culture within the organization. Download Syllabus.

๐Ÿ“š Topics Covered

Session 1 โ€“ Introduction to Cyber Security

  • Definition of Cyber Security and Ethical Hacking
  • Examples of threat in internet and networking.
  • The role of IT leaders and officers in Cyber Security.

Session 2 โ€“ Cyber Threat Landscape

  • IP Address and Networking essential

  • Types of threats: malware, ransomware, phishing, insider threats

  • Advanced Persistent Threats (APT)

  • Current cyber attack trends

Session 3 โ€“ Basic Principle of Information Security

  • CIA Triad: Confidentiality, Integrity, Availability

  • Assets, threats, vulnerabilities, and risks

  • Organizational impact of cyber incidents

  • Case study

Session 4 โ€“ Cyber Risk Management for IT Leadersย 

  • Cyber risk identification and assessment

  • Risk appetite and risk tolerance

  • Integrating cyber risk into enterprise risk management

  • Case study

Session 5 โ€“ Cyber Security Governance

  • Information security governance principles

  • Roles and responsibilities (RACI model)

  • Relationship between IT, management, and officers

  • Case study

Session 6 โ€“ Ethical Hacking

  • Introduction to Ethical Hacking
  • Penetration Testing Execution Standard (PTES)

  • OWASP Top 10

  • NIST & ISO 27001

  • Case study
  • Project Presentation

Target: After completing this course, participatn will be able to:

  1. describeย 

๐ŸŽฏ Learning Outcomes

By the end of this training, participants will:

1. Understand the basics of Cyber security and its threats.

2. To provide a comprehensive understanding of ethical hacking concepts, methodologies, and basic techniques to help participants identify system weaknesses and improve organizational security in an ethical and legal manner.


๐Ÿ“ž Contact

  • ๐Ÿ“ง Email: wbudiharto@binus.edu

  • ๐Ÿ“ฑ Mr. Widodo (WhatsApp): +62 856 9887 384

  • ๐Ÿ“ฑ Ms. Emny (WhatsApp): +62 813 8741 3863


Silabus Pelatihan

Cyber Security for IT Leaders and Officers

๐Ÿ•˜ Durasi: 3ย hari fullday (08:00 – 17:00 WIB)

๐Ÿ‘ฅ Jumlah Peserta Minimum: 5 orang

๐Ÿ’ผ Biaya: Sesuai dengan kesepakatan dan lokasi pelatihan


๐Ÿ“‹ Deskripsi Pelatihan

Di era transformasi digital, ancaman siber menjadi risiko strategis yang dapat berdampak langsung pada operasional, reputasi, dan keberlanjutan organisasi. Cyber Security tidak lagi hanya menjadi tanggung jawab tim IT, tetapi merupakan tanggung jawab bersama, termasuk para officers sebagai pengambil keputusan, pengawas proses, dan penjaga kepatuhan.

Program Cyber Security for Officers ini dirancang untuk membekali peserta dan leader IT di suatu perusahaan dengan pemahaman fundamental mengenai lanskap ancaman siber, prinsip-prinsip keamanan informasi, serta peran dan tanggung jawab officers dalam mencegah, mendeteksi, dan merespons insiden keamanan siber serta beberapa prinsip dan teknik ethical hacking dasar. Melalui silabus ini, peserta akan memahami bagaimana kebijakan, tata kelola, dan perilaku kerja yang aman berkontribusi terhadap perlindungan aset informasi organisasi.

Pelatihan ini menekankan pendekatan praktis dan kontekstual, sehingga officers mampu menerapkan prinsip cyber security dalam pengambilan keputusan sehari-hari, memastikan kepatuhan terhadap regulasi, serta mendukung budaya keamanan informasi yang kuat di lingkungan kerja.


Sesi 1 โ€“ Pengantar Cyber Security

  • Definition of Cyber Security and Ethical Hacking
  • Examples of threat in internet and networking.
  • The role of IT leaders and officers in Cyber Security.

Sesi 2 โ€“ Cyber Threat Landscape

  • IP Address and Networking essential
  • Types of threats: malware, ransomware, phishing, insider threats
  • Advanced Persistent Threats (APT)
  • Current cyber-attack trends

Sesi 3 โ€“ Konsep Information Security

  • CIA Triad: Confidentiality, Integrity, Availability
  • Assets, threats, vulnerabilities, and risks
  • Organizational impact of cyber incidents
  • Case study

 

Sesi 4 โ€“ Cyber Risk Management for IT Leadersย 

  • Cyber risk identification and assessment
  • Risk appetite and risk tolerance
  • Integrating cyber risk into enterprise risk management
  • Case study

Sesi 5 โ€“ Cyber Security Governance

  • Information security governance principles
  • Roles and responsibilities (RACI model)
  • Relationship between IT, management, and officers
  • Case study

Sesi 6 โ€“ Ethical Hacking

  • Introduction to Ethical Hacking
  • Penetration Testing Execution Standard (PTES)
  • OWASP Top 10
  • NIST & ISO 27001
  • Case study
  • Project Presentation

๐ŸŽฏ Target Pelatihan

Setelah mengikuti pelatihan ini, peserta dapat:

  1. Memahami konsep dasar Cyber security dan berbagai jenis ancama (threats).
  2. Menyediakan pemahaman komprehensif dari konsep Cyber Security dan ethical hacking, metodologi dan Teknik mengidentifikasi kelemahan system.

๐Ÿ“ž Kontak

  • ๐Ÿ“ง Email: wbudiharto@binus.edu

  • ๐Ÿ“ฑ Bpk. Prof. Widodo Budiharto (WA): +62 856 9887 384

  • ๐Ÿ“ฑ Ibu Dr. Emny Harna Yossy (WA): +62 813 8741 3863